Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Posted on June 18, 2025June 18, 2025 By CWS

Jun 18, 2025Ravie LakshmananVulnerability / Knowledge Safety

Veeam has rolled out patches to include a crucial safety flaw impacting its Backup & Replication software program that would end in distant code execution beneath sure circumstances.
The safety defect, tracked as CVE-2025-23121, carries a CVSS rating of 9.9 out of a most of 10.0.
“A vulnerability permitting distant code execution (RCE) on the Backup Server by an authenticated area consumer,” the corporate mentioned in an advisory.
CVE-2025-23121 impacts all earlier model 12 builds, together with 12.3.1.1139. It has been addressed in model 12.3.2 (construct 12.3.2.3617). Safety researchers at CODE WHITE GmbH and watchTowr have been credited with discovering and reporting the vulnerability.

Cybersecurity firm Rapid7 famous that the replace doubtless addresses considerations shared by CODE WHITE in late March 2025 that the patch put in place to plug the same gap (CVE-2025-23120, CVSS rating: 9.9) might be bypassed.
Additionally addressed by Veeam is one other flaw in the identical product (CVE-2025-24286, CVSS rating: 7.2) that enables an authenticated consumer with the Backup Operator position to switch backup jobs, which might end in arbitrary code execution.
The American firm individually patched a vulnerability that affected Veeam Agent for Microsoft Home windows (CVE-2025-24287, CVSS rating: 6.1) that allows native system customers to switch listing contents, resulting in code execution with elevated permissions. The problem has been patched in model 6.3.2 (construct 6.3.2.1205).
In keeping with Rapid7, greater than 20% of its incident response instances in 2024 concerned both the entry or exploitation of Veeam, as soon as a risk actor has already established a foothold within the goal atmosphere.
With safety flaws in Veeam backup software program turning into a main goal for attackers in recent times, it is essential that prospects replace to the most recent model of the software program with speedy impact.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Backup, Bug, Critical, CVSS, Rated, RCE, Replication

Post navigation

Previous Post: Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict
Next Post: Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

Related Posts

SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency The Hacker News
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes The Hacker News
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users The Hacker News
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations The Hacker News
APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities
  • PLA Rapidly Deploys AI Technology Across Military Intelligence Operations
  • 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub
  • Critical Vulnerability Patched in Citrix NetScaler
  • System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities
  • PLA Rapidly Deploys AI Technology Across Military Intelligence Operations
  • 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub
  • Critical Vulnerability Patched in Citrix NetScaler
  • System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News